Security Migration Requirements: From Legacy System to Cloud and from Cloud to Cloud
暂无分享,去创建一个
[1] Martin Gilje Jaatun,et al. Deployment models: Towards eliminating security concerns from cloud computing , 2010, 2010 International Conference on High Performance Computing & Simulation.
[2] S Ramgovind,et al. The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.
[3] Wayne A. Jansen,et al. Cloud Hooks: Security and Privacy Issues in Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.
[4] William H. Money,et al. Service Migration in a Cloud Architecture , 2011, 2011 44th Hawaii International Conference on System Sciences.
[5] Ying Zhang,et al. SecDM: Securing Data Migration between Cloud Storage Systems , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.
[6] Ian Sommerville,et al. Decision Support Tools for Cloud Migration in the Enterprise , 2011, 2011 IEEE 4th International Conference on Cloud Computing.
[7] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[8] Joydipto Banerjee. Moving to the cloud: Workload migration techniques and approaches , 2012, 2012 19th International Conference on High Performance Computing.
[9] Yi Lin,et al. Ensure Data Security in Cloud Storage , 2011, 2011 International Conference on Network Computing and Information Security.